{"id":32380,"date":"2016-05-05T05:00:17","date_gmt":"2016-05-05T12:00:17","guid":{"rendered":"http:\/\/blogs.microsoft.com\/cybertrust\/?p=32380"},"modified":"2023-05-15T23:06:05","modified_gmt":"2023-05-16T06:06:05","slug":"microsoft-security-intelligence-report-volume-20-is-now-available","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/","title":{"rendered":"Microsoft Security Intelligence Report Volume 20 is now available"},"content":{"rendered":"

The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at www.microsoft.com\/sir<\/a>.<\/p>\n

We\u2019ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we\u2019ve published over 12,500 pages of threat intelligence<\/em>, 100+ blog posts<\/a>, many videos, and delivered thousands of customer briefings all over the world.<\/p>\n

This new volume of the report includes threat data from the second half of 2015 as well as longer term trend data on industry vulnerabilities, exploits, malware, and malicious websites. The report also provides deep dive threat data for over 100 countries\/regions.<\/p>\n

There are a couple of new sections in this volume of the SIR that I\u2019m excited to share.<\/p>\n

First, the report includes a section called \u201cPLATINUM: Targeted attacks in South and Southeast Asia.\u201d This section provides details on a newly discovered determined adversary group, which Microsoft has code-named PLATINUM. This group has conducted several cyber espionage campaigns since 2009, focusing on targets associated with governments and related organizations in southeast Asia. This information can help you understand mitigations that can significantly reduce the risks that organizations face from such groups.<\/p>\n

The other section I\u2019m excited about is called \u201cProtecting Identities in the Cloud: Mitigating Password Attacks.\u201d This section of the report focuses on some of the things that Microsoft does to prevent account compromise inside our cloud services. This is the first time we\u2019ve published data like this in the SIR.<\/p>\n

There is a lot of other new data in this report that I hope you\u2019ll find useful.<\/p>\n

You can download Volume 20 of the Microsoft Security Intelligence Report at www.microsoft.com\/sir<\/a>.<\/p>\n

Tim Rains
\nDirector, Security<\/p>\n","protected":false},"excerpt":{"rendered":"

The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at www.microsoft.com\/sir. We\u2019ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we\u2019ve published over 12,500 pages of threat intelligence, 100+ blog posts, many videos, and delivered thousands of […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3665],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1954],"class_list":["post-32380","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-analyst-reports","tag-microsoft-security-insights"],"yoast_head":"\nMicrosoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at www.microsoft.com\/sir. We\u2019ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we\u2019ve published over 12,500 pages of threat intelligence, 100+ blog posts, many videos, and delivered thousands of […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-05T12:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tim Rains\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Rains\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/timrains\/\",\"@type\":\"Person\",\"@name\":\"Tim Rains\"}],\"headline\":\"Microsoft Security Intelligence Report Volume 20 is now available\",\"datePublished\":\"2016-05-05T12:00:17+00:00\",\"dateModified\":\"2023-05-16T06:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\"},\"wordCount\":292,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\",\"name\":\"Microsoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2016-05-05T12:00:17+00:00\",\"dateModified\":\"2023-05-16T06:06:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security Intelligence Report Volume 20 is now available\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog","og_description":"The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at www.microsoft.com\/sir. We\u2019ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we\u2019ve published over 12,500 pages of threat intelligence, 100+ blog posts, many videos, and delivered thousands of […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/","og_site_name":"Microsoft Security Blog","article_published_time":"2016-05-05T12:00:17+00:00","article_modified_time":"2023-05-16T06:06:05+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Tim Rains","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tim Rains","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/timrains\/","@type":"Person","@name":"Tim Rains"}],"headline":"Microsoft Security Intelligence Report Volume 20 is now available","datePublished":"2016-05-05T12:00:17+00:00","dateModified":"2023-05-16T06:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/"},"wordCount":292,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/","name":"Microsoft Security Intelligence Report Volume 20 is now available | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2016-05-05T12:00:17+00:00","dateModified":"2023-05-16T06:06:05+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/05\/05\/microsoft-security-intelligence-report-volume-20-is-now-available\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security Intelligence Report Volume 20 is now available"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/32380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=32380"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/32380\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=32380"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=32380"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=32380"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=32380"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=32380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=32380"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=32380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}